Results 21 to 30 of about 63,614 (274)

Reconstructing a lightweight security protocol in the radio‐frequency identification systems

open access: yesIET Computers & Digital Techniques, 2023
Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective ...
Alireza Abdellahi Khorasgani   +2 more
doaj   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

open access: yesCryptography, 2022
Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries.
Riccardo Longo   +4 more
doaj   +1 more source

APTE: An Algorithm for Proving Trace Equivalence [PDF]

open access: yes, 2014
This paper presents APTE, a new tool for automatically proving the security of cryptographic protocols. It focuses on proving trace equivalence between processes, which is crucial for specifying privacy type properties such as anonymity and unlinkability.
B. Blanchet   +5 more
core   +1 more source

A Social-Network-Based Cryptocurrency Wallet-Management Scheme

open access: yesIEEE Access, 2018
Effective cryptocurrency key management has become an urgent requirement for modern cryptocurrency. Although a large body of cryptocurrency wallet-management schemes has been proposed, they are mostly constructed for specific application scenarios and ...
Shuangyu He   +7 more
doaj   +1 more source

Current Status and Future Development of Quantum Cryptographic Protocols

open access: yes中国工程科学, 2022
Quantum computing has the capability of parallel computing and is superior to classical computing in solving some specific problems. Once a large-scale quantum computer is developed, the security of classical cryptographic algorithms and protocols, which
Zhang Xue   +3 more
doaj   +1 more source

Security Threats and Cryptographic Protocols for Medical Wearables

open access: yesMathematics, 2022
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez   +3 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Crypto-Verifying Protocol Implementations in ML [PDF]

open access: yes, 2007
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core   +21 more sources

Agile and Versatile Quantum Communication: Signatures and Secrets

open access: yesPhysical Review X, 2021
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter   +9 more
doaj   +1 more source

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Home - About - Disclaimer - Privacy